18.4.22
If you find yourself with an old Terraform state file (say from v0.11) and you need to run terraform plan
to check things out, you’ll need to make some adjustments:
- Add a
terraform
block with required_providers
to provide the source
for the provider.
- Remove the
version
statement from the provider
block. (You will want to move it to the provider in the required_providers
block.)
- Adjust any other syntax changes that result in errors (
terraform plan
):
list()
→ tolist([])
type = "string"
→ type = string
- Possibly many others…
- Replace the provider in the existing ancient state file.
- Refresh the providers (
terraform init
).
- Plan away!
(more…)
11.11.21
I am pleased to announce that tcsh-6.23 is now available; this is mainly a bug fix release (after 2 years) with a couple of new features:
- Add
jobs -Z
to setproctitle(3)
- Add
ln=target
in LS_COLORS
- Add a
:Q
modifier that preserves empty arguments
Please consult the Fixes file for a complete list of changes. (more…)
31.5.20
For seven years I’ve maintained a small patch to PHP Markdown Extra. However, the upstream was not happy with it, so I just kept my local copy patched. Now I’ve given in: as Markdown has become very popular, it has been better to just adopt a syntax that works across different implementations (e.g. with GitHub Flavored Markdown). (more…)
19.4.20
I occasionally want to run nested screen sessions and this configuration allows me to use the same control character for both the inner and outer sessions by switching between them. (more…)
1.1.20
After installing sudo 1.8.29 from pkgsrc (security/sudo) I started frequently seeing this warning message:
sudo: setrlimit(3): Invalid argument
It took a few rounds, but eventually I applied an acceptable patch for the pkgsrc-2019Q4 release. Later an upstream workaround was committed and included in the sudo 1.8.30 release. (more…)
26.12.19
The new requirements for trusted certificates on macOS Catalina and iOS 13 blocked me from accessing the web UI on Proxmox installations (NET::ERR_CERT_REVOKED
). Fresh installations would work, as Proxmox has been updated to generate “better” certificates. Existing installations, unfortunately, are not automatically fixed on upgrading to Proxmox 6.
Certificate management on Proxmox is handled with pvenode(1)
— except when it isn’t. There is no functionality there for regenerating the self-signed certificates. An older wiki page for HTTPS certificate configuration provided some useful hints: pvecm(1)
has an updatecerts
command. It won’t, however, regenerate existing (unexpired) certificates.
Against the warnings on the Certificate mangement page I thought I’d try removing the apparently relevant files manually:
cd /etc/pve
rm pve-root-ca.pem priv/pve-root-ca.key nodes/*/pve-ssl.{key,pem}
Then I regenerated the certificates and restarted pveproxy(8)
on each node:
pvecm updatecerts --force
systemctl restart pveproxy
Refreshing the page in the browser restores access to the web UI.